摘要
密码芯片的硬件安全模块在IC生产和制造的过程中易被植入硬件木马等恶意电路。鉴于硬件木马的强大功能,提出了基于RS232协议时隙的硬件木马设计方法。利用RS232协议的异步特性,对其发送密文字节间的时隙进行编码,从而实现密码芯片中密钥的隐蔽泄漏;并通过功能分析和电磁旁路分析两种方法成功检测出木马所发送出的密钥。实验表明,该硬件木马在占用不到40个寄存器的情况下,成功实现了DES密钥的泄漏。
Hardware security modules for crypto-processors may be threatened due to the inserting of malicious circuits in IC fabrication process, such as hardware Trojan which is of strong function. To research the issue, a hardware Trojan design based on interval property of RS232 protocol is proposed. On the basic of the asynchronous point of RS232, an attack for leakage of secret key can be implemented to encode the inter-byte timing of the en- crypted data output on the RS232 serial port. Two methods, function analysis and electromagnetic side-channel analysis, are applied to detect the running process of hardware Trojan. The experimental results show that the at- tack could implement the leakage of secret key while the hardware Trojan circuits occupy less than 40 flip-flops.
出处
《科学技术与工程》
北大核心
2013年第28期8284-8287,共4页
Science Technology and Engineering
基金
国家自然科学基金(61271152)
河北省自然科学基金(F2012506008)
院基金(YJJXM11019)资助
关键词
RS232
硬件木马
功能分析
电磁旁路分析
RS232 hardware Trojan function analysis electromagnetic side-channel analysis